@inbook{ac3b2b14a205471a81ae5364a13f31e7,
title = "Vulnerability studies of E2E voting systems",
abstract = "In the recent years, the existence of end-to-end voter-verifiable (E2E) voting system had increased significantly. Some of the prospective ones have been used in a medium to large scale elections. We have also developed one (eVote). In this paper we review their capabilities to provide an individual and universally verifiable voting system, incoercibility and receipt-freeness to ensure election integrity. We compare some properties along with its resistance against malicious attacks.",
keywords = "Attacks, Electronic voting, End-to-end verifiable system, Security threats, System Requirements",
author = "Lauretha Rura and Biju Issac and Manas Haldar",
year = "2015",
doi = "10.1007/978-3-319-06773-5_30",
language = "English",
isbn = "978-3-319-06772-8",
volume = "313",
series = "Lecture Notes in Electrical Engineering",
publisher = "Springer",
pages = "223--231",
booktitle = "Innovations and Advances in Computing, Informatics, Systems Sciences, Networking and Engineering",
address = "Germany",
}